MSIS: Recent submissions

  • Nasir, Rida; Supervised by Dr Mehreen Afzal. (MCS, 2021-02)
    In today’s world the most dangerous security threats are not launched by malicious outsiders or malware but from trusted insiders. The exploitation and leakage of sensitive data and information by malicious insiders is ...
  • Amjad, Faiqa; Supervised by Dr. Fawad Khan. (MCS, 2020-12)
    With the ever increasing growth in the number of online video viewers on internet, the service providers are getting curious regarding the nature of content being revolved over the network without actively interacting with ...
  • Mumtaz, Zainub (MCS, National University of Sciences and Technology, 2017)
    Most of the commercial antiviruses are signature based, that is, they use existing database signature to detect the malware. Malware authors use code obfuscation techniques to evade detection by antiviruses. Metamorphic ...
  • Khan, Waqas Ali (MCS, National University of Sciences and Technology, 2012)
    iPhone is always under the scrutiny of mobile and computer hackers because of its popularity and the diverse set of tasks it is able to perform. However, the purpose of the scrutiny is always to reveal the internal ...
  • Kianee, Reeda Iftikhar (MCS, National University of Sciences and Technology, 2012)
    Tweakable ciphers are a relatively new and interesting area in the field of cryptology. It is a current subject and considerable researches have been carried out on the topic. It is a step further in the field of ...
  • Ashraf, Naveeda (MCS, National University of Sciences and Technology, 2017)
    In today’s world of advanced Internet, mobility is a key service. The use of smart phones, tablets and wearable devices is on the rise at fast pace. However, traditional software-based security solutions are unable to ...
  • Shaikh, Rizwan Ahmed; Supervised by Dr. Imran Rashid. (MCS, 2020-10)
    Many organizations process and store classified data within their computer networks. Owing to the value of data that they hold; such organizations are more vulnerable to targets from adversaries. Accordingly, the sensitive ...
  • Malik, Wajahat Sultan; Supervised by Dr. Fawad Khan. (MCS, 2020-09)
    The information security requirements are increasing due to huge expansion of data in various fields. For the Clients with the limited resources, dealing with huge data is always been a significant problem. Cloud computing ...
  • Mehfooz, Aamna; Supervised by Mian Muhammad Waseem Iqbal. (MCS, 2020-10)
    In this study reviewed the current Pakistan’s cyber threats landscape by focusing on the global rankings and among them standing of Pakistan as a developing country. Emerging threats, risks and behavioral and technical ...
  • Akhtar, Zahara Batool; Supervised by Mian Muhammad Waseem Iqbal. (MCS, 2020-09)
    Download managers have become a popular way of downloading content from the internet. These download managers are software applications or apps which provide fast and secure downloads. But not all apps are trustworthy. ...
  • Ghazanfar, Imama; Supervised by Dr. Haider Abbas. (MCS, 2020-08)
    With the growing usage of internet in Pakistan, Government of Pakistan is also utilizing the internet for communication and delivery of e-services to the people. Websites being one of the easiest ways of communication over ...
  • Pasha, Simmal; Supervised by Dr Abdul Ghafoor. (MCS, 2020-08)
    Digital watermarking is a method that prevents unauthorized distribution of copyrighted material by providing means of proving ownership of the material. This thesis introduces a watermarking technique based on lifting ...
  • Jamil, Zikrat; Supervised by Dr Muhammad Faisal Amjad. (MCS, 2020-09)
    As the list of Internet of Things’ (IoT) devices, and the advantages they offer, continues to grow, the security threats to these devices continue to flourish. Most dangerous and irrepressible among these threats is ...
  • Rafiq, Shahid; Supervised by Dr Mehreen Afzal. (MCS, 2020-09)
    HTTPS is used to secure the communication (transactions and other activities) over Internet using SSL. HTTPS enables entire encryption of the data to be kept confidential being transmitted from the client browser to the ...
  • Khan, Waqas Ajmal; Supervised by Dr. Fawad Khan. (MCS, 2020-09)
    Data deduplication performs a significant role in reducing the storage overhead of cloud service providers (CSP) and lowers the cost of end user packages. Besides deduplication, CSP and their respective clients are also ...
  • Hassan, Mehmood ul; Supervised by Dr. Shahzaib Tahir. (MCS, 2020-08)
    The rapid development in the field of cloud computing, big data, and machine learning, motivates individuals and enterprises to outsource their multimedia and image data to the cloud. Although, outsourcing reduces the ...
  • Ahmed, Bilal; Supervised by Dr.Imran Rashid. (MCS, 2020-09)
    In today’s world, state power is demonstrated in a number of ways in tangible domain, may it be sea, air, land or space. Domain of Internet, though intangible is no exception. Although geographical boundaries are not ...
  • Sultan, Ahmed Raheeq; Supervised by Dr.Imran Rashid. (MCS, 2020-07)
    We have numerous systems being used in daily life where two entities authenticate each other over a range of distance. The distance involved is relatively small, but still attacks were documented. Distance Bounding (DB) ...
  • Mirza, Samrah; Supervised by Dr Haider Abbas. (MCS, 2020-01)
    Mobile malware threats have become a real concern. Malware authors are coming up with smarter ways to build applications that can easily compromise confidentiality, integrity and availability of the user’s data and perform ...
  • Raza Khan, Abdur Rehman; Supervised by Dr Mehreen Afzal. (MCS, 2019-09)
    The rapid development of wireless sensor networks and RFID technologies is transform­ ing every aspect of human life ranging from personal fitness companions to goods tracking in the supply chain industry. The sensitive ...

Search DSpace


Advanced Search

Browse

My Account